Whilst the digital space provides many opportunities for businesses and organisations alike, it also brings with it risk. Cyber crime is one of the fastest growing threats to business.
At Millbridge we have a blend of people with IT, military security and board level business expertise. So, we understand businesses their pressures and drivers, the necessity for, and benefits from IT and the need for proportionate and pragmatic security to mitigate risk. So, depending upon whether clients seek expertise to help identify and manage the risks? Or assurance that their own efforts are being applied to good effect the Cyber Security Team at Millbridge has the knowledge and experience to help.

Cyber Security Services


Cyber Security Strategy

For businesses whether large or small, the clear view of many regulatory and professional bodies is that cyber security starts with board level leadership. At Millbridge we have the knowledge and expertise to help guide boards in their analysis and understanding of the cyber security risks to their organisation, in order that they can develop and implement a proportionate and cost effective strategy to mitigate those risks and protect their business..

Working with the senior leadership of the client organisation the Millbridge Team seek to understand the Business’s overall objectives in order to produce a cyber security strategy, which helps deliver these whilst complimenting other business strategies, regulatory obligations and prevailing good practice. Depending upon need, the service can include:

•Risk Analysis

•Data Value Analysis

•Training Needs Analysis

•Document production and implementation

•Demonstrate Board level responsibility for and engagement in cyber security

•Identification and understanding of key cyber risks

•Develop pragmatic, proportionate and cost effective mitigation plans

•Develop effective implementation plans


IT Health Check

For organisations wishing to get to grips with cyber security or for others more advanced, seeking to validate and develop their existing security stance the IT Health Check is a sensible starting point. It provides a broad, overarching snapshot of the current status of cyber security within an organisation. Looking across strategy, processes and deployed technologies, it seeks to identify vulnerabilities, categorise risk and recommend remediation, which can help inform business planning.

As recommended by the UK Government, the IT Health Check will involve vulnerability scanning and manual analysis of your internal network. Depending upon your organisation’s systems it should include:

•Desktop and server build and configuration, and network management security.

•Patching at operating system, application and firmware level.

•Configuration of remote access solutions (including solutions for managed devices and BYOD).

•Build and Configuration of laptops and other mobile devices such as phones and tablets used for remote access.

•Internal security gateway configuration (including any PSN gateway)

•Wireless network configuration

In addition, we also advocate that the check cover:

•A desktop review of strategy and key policy / process documentation

•A desktop review of organisational compliance with Professional or Regulatory body’s standards.

• Demonstrates clear intent to Regulators regarding the organisation’s engagement in cyber security

• Provides assurance and identifies areas requiring further attention, which helps inform:

◦ Business Planning

◦ Continuous Improvement initiatives

◦ Budgeting

• Can sometimes be a prerequisite for some regulatory accreditations.


Cyber Essentials

Cyber Essentials is a Government and Industry backed scheme, which defines a set of controls which, when properly implemented, provide organisations with basic protection from the most prevalent forms of cyber threat. At Millbridge we understand the certification requirements and can help businesses identify what they need to put in place to ensure a successful application.

* Analysis of the organisations current controls.

* Gap analysis and remediation.

* Completed application leading to successful certification.

* Demonstrates a basic understanding of prevalent cyber threats and associated mitigations.

* Helps build trust regarding cyber security awareness and competence with customers and suppliers.


Assurance (Audit & Review)

Whether your organisation’s senior leadership just want to be reassured that the technology and processes they have applied to their business remain fit for purpose and are being applied appropriately or, you are seeking help preparing your organisation for a formal external audit, we have the knowledge and experience to help you.

* Internal audit of security controls & processes

* Audit of the business’s Information Security Management System (ISMS)

* Help prepare an organisation for external audit

* ISO 27001

* ISO 27002

* PSN Certification

* CAS(T) Certification

* Cyber Essentials Plus

* Attendance during and management of formal audit process

* Drive info security help drive application of strategy

* Development and management of internal and external audit programmes

* Provides reassurance that prevailing security architectures and technologies remain appropriate for the needs of the business.

* Identifies essential rectifications to close out critical vulnerabilities.

* Identifies desirable improvements for incorporation in continuous improvement plans.

* Provides reassurance that current processes and procedures remain appropriate and are being applied by staff as required.

* Identifies any training needs amongst employees.

* Identifies rectifications to mitigate the risk of failure ahead of expensive audits by certifying bodies.


Security Architecture

If you are considering upgrading or renewing your IT systems, security architecture is where we would recommend you start. If you wish to maximise your security and minimise your costs security architecture should be at the foundation of your organisation’s systems, not an afterthought shoe-horned in, halfway through your project. That tends to be unnecessarily expensive. A good security framework and methodology for application will help define your IT lifecycle with the term “Secure by Design” being the guiding principle.

* Full spectrum design and project delivery capability

* Enterprise solutions

* Cryptography

* Firewalls

* Wireless networks

* Data storage solutions (onsite or Cloud based)

* Virtual Private Networks (VPNs)

* Bring Your Own Device (BYOD) integration

* Business continuity solutions

* Training needs analysis

* Supporting plans, policies and procedures

* Secure by design – place security architecture at the core of the system.

* Designed to minimise maintenance burden.

* 90% of cyber breaches can be attributed to a human root cause; focus on the human interface and reduce the risk of failure.

* Ensure the most cost effective solution.


Additional Cyber Security Services

Incident Response

Click Me

Cyber Health Check

Click Me

Penetration Testing

Click Me

Security Monitoring

Click Me